08-08-2023, 07:24 AM
Last updated 6/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 14.14 GB | Duration: 21h 24m
CompTIA Security+ (SY0-601) Bootcamp - Your preparation for the world's best cybersecurity certification!
What you'll learn
Passing the CompTIA Security+ certification exam with confidence
Understand computer security, its functions, and its components
Performing basic security configurations
Become an effective security technician in a business environment
Requirements
Basic familiarity with computer networks, administration, and security is helpful (But, all required information will be covered during the course)
(Helpful, but not required) Completion of the CompTIA A+ and Network+ certifications
Description
** Taught by a Best Selling IT Certification Instructor **Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security. My name is Jason Dion, and I have personally helped over 500,000 students earn their IT certifications, and now I can help you, too!You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the CompTIA Security+ exam. CompTIA Security+ (SY0-601) is the world's most popular cybersecurity certification today!This course is designed to help prepare you for the CompTIA Security (SY0-601) certification exam and covers all the domains the Security+ (SY0-601) certification exam:CompTIA Security+ (SY0-601):Attacks, Threats, and VulnerabilitiesArchitecture and DesignImplementationOperations and Incident ResponseGovernance, Risk, and ComplianceWhat You Will Receive In The Course:Video lectures with the essential information needed to pass the Security+ (SY0-601) examA complete downloadable study guide in PDF format based on the lessonsPractice quizzes to ensure mastery of each section of the courseA full-length practice exam with multiple choice and mock simulationsThis course stays current and up-to-date with the latest release of the CompTIA Security+ exam (SY0-601), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!What Other Students Are Saying About My CompTIA Security+ Course:Solid information, acronym break downs throughout the course (allows for better note taking). Jason is easy to follow, listen to, and understand during your study period (I sit for hours listening and taking notes and replaying the section) (Mark Guillen, 5 stars)Just passed my security+ today!!!! Dion's course was excellent. It was all I needed, and I took his practice tests I also purchased. The only thing I think would help other testers is more sophisticated and harder performance-based questions as I experienced ones today that were pretty tough and required more hands-on experience. Overall, though completely worth the money. (Duran navarro, 5 stars)The course is very informative and good for people that has no knowledge about cybersecurity so far. It teaches us about the harm caused by attacks and how to prevent them. I would suggest everyone to take this course, even if they don't wan the certificate from Comptia. (Mahmoud Choumar, 5 stars)Jason is a great pedagogue. He is thorough and amiable. The course has very minimal errors and you can tell he is very strict with the format of his lessons. I had very few questions during the lectures and only experience one issue throughout the whole experience. I will definitely buy more courses from him. I also bought the voucher from his website to get the retake for only 100 bucks! Good job Dion Training! Keep up the great job! (Victor Cabrales, 5 stars)Passed the exam in December of 2022 using this course - FIRST TRY!! This course gave the back bone of everything I needed to pass the Sec. + exam. When the time came to study up a day or two before the actual exam, I used all the practice quizzes/tests from the CompTIA Sec. + study book. Seems thoughtless or stupid to not use the book for actual studying, but I found I learn slightly better in a class environment and this course/videos allowed me that. Thank you for this course and I look forward to many more in the future! Honestly, I haven't taken an ACTUAL exam in years - many years. If I can do it, you all can too! Good luck and God speed! (Nathaniel Shumaker, 5 stars)Upon completion of this course, you will earn 21 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.
Overview
Section 1: Overview of Security
Lecture 1 Welcome
Lecture 2 Download the Study Guide
Lecture 3 Overview of Security
Lecture 4 CIA Triad
Lecture 5 AAA of Security (OBJ 2.4)
Lecture 6 Security Threats (OBJ 1.1 & 1.2)
Lecture 7 Mitigating Threats (OBJ 5.1)
Lecture 8 Hackers (OBJ 1.5)
Lecture 9 Threat Actors (1.5)
Lecture 10 Threat Intelligence and Sources (OBJ 1.5)
Lecture 11 Threat Hunting (OBJ 1.7)
Lecture 12 Attack Frameworks (OBJ 4.2)
Section 2: Malware
Lecture 13 Malware (OBJ 1.2)
Lecture 14 Viruses (OBJ 1.2)
Lecture 15 Worms (OBJ 1.2)
Lecture 16 Trojans (OBJ 1.2)
Lecture 17 Demo: Viruses and Trojans (OBJ 1.2)
Lecture 18 Ransomware (OBJ 1.2)
Lecture 19 Spyware (OBJ 1.2)
Lecture 20 Rootkits (OBJ 1.2 & 1.3)
Lecture 21 Spam (OBJ 1.1)
Lecture 22 Summary of Malware
Section 3: Malware Infections
Lecture 23 Malware Infections
Lecture 24 Common Delivery Methods (OBJ 1.1 & 1.5)
Lecture 25 Demo: Phishing (OBJ 1.1 & 5.3)
Lecture 26 Botnets and Zombies (OBJ 1.2 & 1.4)
Lecture 27 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4)
Lecture 28 Demo: Privilege Escalation (OBJ 1.3 & 1.8)
Lecture 29 Backdoors and Logic Bombs (OBJ 1.2)
Lecture 30 Symptoms of Infection (OBJ 1.2)
Lecture 31 Removing Malware (OBJ 4.2)
Lecture 32 Preventing Malware (OBJ 1.6 & 3.2)
Lecture 33 Malware Exploitation (OBJ 1.2 & 1.4)
Section 4: Security Applications and Devices
Lecture 34 Security Applications and Devices
Lecture 35 Software Firewalls (OBJ 3.2)
Lecture 36 Demo: Software Firewalls (OBJ 3.2)
Lecture 37 IDS (OBJ 3.2 & 3.3)
Lecture 38 Pop-up Blockers (OBJ 1.1, 3.3, 4.4)
Lecture 39 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4)
Lecture 40 Securing the BIOS (OBJ 3.2)
Lecture 41 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3)
Lecture 42 Disk Encryption (OBJ 2.1, 2.8 & 3.2)
Lecture 43 Endpoint Analysis (OBJ 3.1 & 3.3)
Section 5: Mobile Device Security
Lecture 44 Mobile Device Security (OBJ 1.5)
Lecture 45 Securing Wireless Devices (OBJ 3.4 & 3.5)
Lecture 46 Mobile Malware (OBJ 1.1 & 3.5)
Lecture 47 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6)
Lecture 48 Bluetooth Attacks (OBJ 1.4 & 3.4)
Lecture 49 Mobile Device Theft (OBJ 3.5)
Lecture 50 Security of Apps (OBJ 3.1 & 3.5)
Lecture 51 BYOD (OBJ 3.5)
Lecture 52 Hardening Mobile Devices (OBJ 3.5)
Section 6: Hardening
Lecture 53 Hardening (OBJ 3.2)
Lecture 54 Unnecessary Applications (OBJ 1.6)
Lecture 55 Restricting Applications (OBJ 3.2 & 4.4)
Lecture 56 Demo: Unnecessary Services (OBJ 3.2 & 3.3)
Lecture 57 Trusted Operating System (OBJ 3.2)
Lecture 58 Updates and Patches (OBJ 1.6 & 3.2)
Lecture 59 Patch Management (OBJ 1.6 & 3.2)
Lecture 60 Group Policies (OBJ 2.1)
Lecture 61 Demo: Group Policies (OBJ 3.2)
Lecture 62 File Systems and Hard Drives (OBJ 2.1 & 3.2)
Section 7: Supply Chain Management
Lecture 63 Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6)
Lecture 64 Root of Trust (OBJ 3.2)
Lecture 65 Trusted Firmware (OBJ 3.2)
Lecture 66 Secure Processing (OBJ 3.2)
Section 8: Virtualization
Lecture 67 Virtualization (OBJ 2.2)
Lecture 68 Hypervisors (OBJ 2.2)
Lecture 69 Demo: How to create a VM (OBJ 2.2)
Lecture 70 Threats to VMs (OBJ 2.2)
Lecture 71 Securing VMs (OBJ 2.2)
Lecture 72 Demo: Securing VMs
Section 9: Application Security
Lecture 73 Application Security
Lecture 74 Web Browser Security (OBJ 3.2 & 3.3)
Lecture 75 Web Browser Concerns (OBJ 3.2 & 3.3)
Lecture 76 Demo: Web Browser Configuration (OBJ 3.2 & 3.3)
Lecture 77 Securing Applications (OBJ 1.4 & 3.2)
Section 10: Secure Software Development
Lecture 78 Software Development (OBJ 2.1 & 2.3)
Lecture 79 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3)
Lecture 80 Testing Methods (OBJ 2.3 & 3.2)
Lecture 81 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6)
Lecture 82 Buffer Overflows (OBJ 1.3)
Lecture 83 Demo: Buffer Overflow Attack (OBJ 1.3)
Lecture 84 XSS and XSRF (OBJ 1.3)
Lecture 85 SQL Injection (OBJ 1.3)
Lecture 86 Demo: SQL Injection (OBJ 1.2 & 1.3)
Lecture 87 XML Vulnerabilities (OBJ 1.3)
Lecture 88 Race Conditions (OBJ 1.3)
Lecture 89 Design Vulnerabilities (OBJ 1.3)
Section 11: Network Design
Lecture 90 Network Security
Lecture 91 The OSI Model (OBJ 3.3 & 3.6)
Lecture 92 Switches (OBJ 1.4 & 2.7)
Lecture 93 Routers (OBJ 3.3)
Lecture 94 Network Zones (OBJ 3.3)
Lecture 95 ** Jumpbox (OBJ 3.5)
Lecture 96 Network Access Control (OBJ 3.3 & 4.4)
Lecture 97 VLANs (OBJ 3.3)
Lecture 98 Subnetting (OBJ 3.6)
Lecture 99 Network Address Translation (OBJ 3.3)
Lecture 100 Telephony (OBJ 3.1)
Section 12: Perimeter Security
Lecture 101 Perimeter Security
Lecture 102 Firewalls (OBJ 3.3 & 4.4)
Lecture 103 Demo: SOHO Firewall (OBJ 3.3 & 4.4)
Lecture 104 Proxy Servers (OBJ 3.3 & 4.4)
Lecture 105 Honeypots and Honeynets (OBJ 2.1)
Lecture 106 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4)
Lecture 107 NIDS and NIPS (OBJ 3.3)
Lecture 108 Unified Threat Management (OBJ 3.2 & 3.3)
Section 13: Cloud Security
Lecture 109 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6)
Lecture 110 Cloud Types (OBJ 2.2 & 3.6)
Lecture 111 As a Service (OBJ 2.2)
Lecture 112 Cloud Security (OBJ 2.5 & 3.6)
Lecture 113 Defending Servers (OBJ 1.7, 3.1, and 3.2)
Lecture 114 Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6)
Lecture 115 CASB (OBJ 2.1)
Lecture 116 API (OBJ 2.1)
Lecture 117 FAAS and Serverless (OBJ 2.2)
Lecture 118 Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2)
Section 14: Automation
Lecture 119 Workflow Orchestration (OBJ 2.3)
Lecture 120 CI/CD (OBJ 2.3)
Lecture 121 DevSecOps (OBJ 2.3)
Lecture 122 IAC (OBJ 2.2)
Lecture 123 Machine Learning (OBJ 1.2)
Section 15: Network Attacks
Lecture 124 Network Attacks (OBJ 1.4)
Lecture 125 Ports and Protocols (OBJ 3.1)
Lecture 126 Memorization of Ports (OBJ 3.1)
Lecture 127 Unnecessary Ports (OBJ 1.6 & 3.2)
Lecture 128 Denial of Service (OBJ 1.3 & 1.4)
Lecture 129 DDoS (OBJ 1.2, 1.3, & 1.4)
Lecture 130 Stopping a DDoS (OBJ 2.1 & 2.3)
Lecture 131 Spoofing (OBJ 1.4 & 3.3)
Lecture 132 Hijacking (OBJ 1.3 & 1.4)
Lecture 133 Replay Attack (OBJ 1.3)
Lecture 134 Demo: Null Sessions (OBJ 1.6)
Lecture 135 Transitive Attacks (OBJ 2.4)
Lecture 136 DNS Attacks (OBJ 1.1, 1.4 & 3.1)
Lecture 137 ARP Poisoning (OBJ 1.4)
Section 16: Securing Networks
Lecture 138 Securing Networks (OBJ 3.3)
Lecture 139 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7)
Lecture 140 Securing Network Media (OBJ 2.7)
Lecture 141 Securing WiFi Devices (OBJ 1.4 & 3.4)
Lecture 142 Wireless Encryption (OBJ 1.6 & 3.4)
Lecture 143 Wireless Access Points (OBJ 1.4 & 3.4)
Lecture 144 Wireless Attacks (OBJ 1.2, 1.4 & 1.8)
Lecture 145 Demo: Wireless Attack (OBJ 1.4)
Lecture 146 WPA3 (OBJ 3.4)
Lecture 147 Other Wireless Technologies (OBJ 1.4 & 3.5)
Section 17: Physical Security
Lecture 148 Physical Security (OBJ 2.7)
Lecture 149 Surveillance (OBJ 2.7)
Lecture 150 Door Locks (OBJ 2.7)
Lecture 151 Demo: Lock Picking (OBJ 2.7)
Lecture 152 Biometric Readers (OBJ 2.4)
Section 18: Facilities Security
Lecture 153 Facilities Security (OBJ 2.7)
Lecture 154 Fire Suppression (OBJ 2.7)
Lecture 155 HVAC (OBJ 2.5, 2.6, & 2.7)
Lecture 156 Shielding (OBJ 2.7)
Lecture 157 Vehicular Vulnerabilities (OBJ 2.6 & 2.7)
Lecture 158 IoT Vulnerabilities (OBJ 2.6)
Lecture 159 Embedded System Vulnerabilities (OBJ 2.6)
Lecture 160 ICS and SCADA Vulnerabilities (OBJ 2.6)
Lecture 161 Mitigating Vulnerabilities (OBJ 2.6)
Lecture 162 Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6)
Section 19: Authentication
Lecture 163 Authentication (OBJ 2.4, 3.5, & 3.8)
Lecture 164 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9)
Lecture 165 802.1x (OBJ 3.4 & 3.8)
Lecture 166 LDAP and Kerberos (OBJ 3.1 & 3.8)
Lecture 167 Remote Desktop Services (OBJ 3.1)
Lecture 168 Remote Access Service (OBJ 3.1 & 3.8)
Lecture 169 VPN (OBJ 3.3)
Lecture 170 RADIUS vs TACACS+ (OBJ 3.8)
Lecture 171 Authentication Summary (OBJ 3.8)
Lecture 172 Authentication Attacks (OBJ 1.2)
Section 20: Access Control
Lecture 173 Access Control (OBJ 3.8)
Lecture 174 Access Control Models (OBJ 3.8)
Lecture 175 Best Practices (OBJ 2.7, 3.8, & 5.3)
Lecture 176 Users and Groups (OBJ 3.7 & 3.8)
Lecture 177 Permissions (OBJ 3.8)
Lecture 178 Usernames and Passwords (OBJ 1.6 & 3.7)
Lecture 179 Demo: Policies (OBJ 3.7)
Lecture 180 User Account Control (OBJ 3.7 & 3.8)
Section 21: Risk Assessments
Lecture 181 Risk Assessments (OBJ 5.4)
Lecture 182 Qualitative Risk (OBJ 5.4)
Lecture 183 Quantitative Risk (OBJ 5.4)
Lecture 184 Methodologies (OBJ 1.7 & 5.4)
Lecture 185 Security Controls (OBJ 5.1)
Lecture 186 Types of Risk (OBJ 1.6 & 5.4)
Section 22: Vulnerability Management
Lecture 187 Vulnerability Management (OBJ 1.7, 4.1, & 5.4)
Lecture 188 Penetration Testing (OBJ 1.8)
Lecture 189 Training and Exercises (OBJ 1.8 & 4.2)
Lecture 190 OVAL (OBJ 1.7)
Lecture 191 Vulnerability Assessments (OBJ 1.7 & 4.1)
Lecture 192 Demo: Nmap Scanning (OBJ 4.1)
Lecture 193 Demo: Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3)
Lecture 194 Password Analysis (OBJ 1.2)
Lecture 195 Demo: Password Cracking (OBJ 4.1)
Section 23: Monitoring and Auditing
Lecture 196 Monitoring Types (OBJ 3.3)
Lecture 197 Performance Baselining (OBJ 2.1)
Lecture 198 Protocol Analyzers (OBJ 3.3 & 4.1)
Lecture 199 SNMP (OBJ 3.1)
Lecture 200 Demo: Analytical Tools (OBJ 4.1)
Lecture 201 Auditing (OBJ 1.7)
Lecture 202 Demo: Auditing Files (OBJ 1.7)
Lecture 203 Logging (OBJ 1.7, 4.3, & 4.5)
Lecture 204 Log Files (OBJ 4.3)
Lecture 205 SIEM (OBJ 1.7 & 4.3)
Lecture 206 Syslog (OBJ 1.7 & 4.3)
Lecture 207 SOAR (OBJ 1.7 & 4.4)
Section 24: Cryptography
Lecture 208 Cryptography (OBJ 2.1 & 2.8)
Lecture 209 Symmetric vs Asymmetric (OBJ 2.8)
Lecture 210 Symmetric Algorithms (OBJ 2.8)
Lecture 211 Public Key Cryptography (OBJ 2.8)
Lecture 212 Asymmetric Algorithms (OBJ 2.8)
Lecture 213 Pretty Good Privacy (OBJ 2.8)
Lecture 214 Key Management (OBJ 2.8)
Lecture 215 One-Time Pad (OBJ 2.8)
Lecture 216 Demo: Steganography (OBJ 2.8)
Lecture 217 Cryptography Considerations (OBJ 2.8)
Section 25: Hashing
Lecture 218 Hashing (OBJ 1.2, 2.8 & 3.2)
Lecture 219 Demo: Hashing (OBJ 2.8)
Lecture 220 Hashing Attacks (OBJ 1.2,1.3, & 2.8)
Lecture 221 Increasing Hash Security (OBJ 2.8 & 3.7)
Section 26: Public Key Infrastructure
Lecture 222 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9)
Lecture 223 Digital Certificates (OBJ 3.9)
Lecture 224 Demo: Certificates (OBJ 2.8 & 3.9)
Lecture 225 Certificate Authorities (OBJ 3.2 & 3.9)
Lecture 226 Web of Trust (OBJ 3.9)
Section 27: Security Protocols
Lecture 227 Security Protocols (OBJ 3.1)
Lecture 228 S/MIME (OBJ 3.1)
Lecture 229 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3)
Lecture 230 SSH (OBJ 3.1 & 4.1)
Lecture 231 VPN Protocols (OBJ 3.1 & 3..3)
Lecture 232 Demo: Setting up a VPN (OBJ 3.3)
Section 28: Planning for the Worst
Lecture 233 Planning for the Worst (OBJ 2.5 & 5.4)
Lecture 234 Redundant Power (OBJ 2.5)
Lecture 235 Backup Power (OBJ 2.5)
Lecture 236 Data Redundancy (OBJ 2.5)
Lecture 237 Demo: RAIDs (OBJ 2.5)
Lecture 238 Network Redundancy (OBJ 2.5)
Lecture 239 Server Redundancy (OBJ 2.5 &3.3)
Lecture 240 Redundant Sites (OBJ 2.1)
Lecture 241 Data Backup (OBJ 2.5)
Lecture 242 Tape Rotation (OBJ 2.5)
Lecture 243 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4)
Lecture 244 Business Impact Analysis (OBJ 5.4)
Section 29: Social Engineering
Lecture 245 Social Engineering (OBJ 1.1)
Lecture 246 Demo: Pretexting (OBJ 1.1 & 5.3)
Lecture 247 Insider Threat (OBJ 1.5)
Lecture 248 Phishing (OBJ 1.1 & 5.3)
Lecture 249 Motivation Factors (OBJ 1.1)
Lecture 250 More Social Engineering (OBJ 1.1 & 1.2)
Lecture 251 Fraud and Scams (OBJ 1.1)
Lecture 252 Influence Campaigns (OBJ 1.1)
Lecture 253 User Education (OBJ 5.3)
Section 30: Policies and Procedures
Lecture 254 Policies and Procedures (OBJ 5.2 & 5.3)
Lecture 255 Data Classifications (OBJ 5.3 & 5.5)
Lecture 256 Data Ownership
Lecture 257 PII and PHI (OBJ 5.2 & 5.5)
Lecture 258 Legal Requirements (OBJ 5.2 & 5.5)
Lecture 259 Privacy Technologies (OBJ 5.5)
Lecture 260 Security Policies (OBJ 5.3 & 5.5)
Lecture 261 User Education (OBJ 5.3)
Lecture 262 Vendor Relationships (OBJ 5.3)
Lecture 263 Disposal Policies (OBJ 2.7 & 4.1)
Lecture 264 IT Security Frameworks (OBJ 5.2)
Lecture 265 Key Frameworks (OBJ 5.2)
Section 31: Incident Response and Forensics
Lecture 266 Incident Response Procedures (OBJ 4.2)
Lecture 267 Incident Response Planning (OBJ 4.2)
Lecture 268 Investigative Data (OBJ 4.3)
Lecture 269 Forensic Procedures (OBJ 4.5)
Lecture 270 Data Collection Procedures (OBJ 4.1 & 4.5)
Lecture 271 Demo: Disk Imaging (OBJ 4.1)
Lecture 272 Security Tools (OBJ 4.1)
Section 32: Conclusion
Lecture 273 Conclusion
Lecture 274 BONUS: What's Next?
Section 33: Practice Exam
Students wanting to pass the CompTIA Security+ certification exam,Students wanting to learn the terminology and nomenclature of computer security,Students seeking a career in cyber security
Buy Premium Account From My Download Links & Get Fastest Speed.